Sciweavers

672 search results - page 78 / 135
» Words and forbidden factors
Sort
View
CHI
2008
ACM
14 years 9 months ago
Security practitioners in context: their activities and interactions
This study investigates the context of interactions of IT security practitioners, based on a qualitative analysis of 30 interviews and participatory observation. We identify nine ...
Rodrigo Werlinger, Kirstie Hawkey, Konstantin Bezn...
CHI
2005
ACM
14 years 9 months ago
Breaking the laws of action in the user interface
Fitts' law, Steering law and Law of crossing, collectively known as the laws of action, model the speed-accuracy tradeoffs in common HCI tasks. These laws impose a certain sp...
Per Ola Kristensson
RECOMB
2001
Springer
14 years 9 months ago
Predicting the beta-helix fold from protein sequence data
A method is presented that uses b-strand interactions to predict the parallel right-handed b-helix super-secondary structural motif in protein sequences. A program called BetaWrap...
Phil Bradley, Lenore Cowen, Matthew Menke, Jonatha...
STOC
2001
ACM
159views Algorithms» more  STOC 2001»
14 years 9 months ago
Optimal static range reporting in one dimension
We consider static one dimensional range searching problems. These problems are to build static data structures for an integer set S U, where U = {0, 1, . . . , 2w - 1}, which su...
Stephen Alstrup, Gerth Stølting Brodal, The...
ICCD
2006
IEEE
185views Hardware» more  ICCD 2006»
14 years 5 months ago
An accurate Energy estimation framework for VLIW Processor Cores
— In this paper, we present a comprehensive energy estimation framework for software executing on Very Long Instruction Word (VLIW) processor cores. The proposed energy model is ...
Sourav Roy, Rajat Bhatia, Ashish Mathur